RFR: 8333583: Crypto-XDH.generateSecret regression after JDK-8329538 [v3]
Anthony Scarpino
ascarpino at openjdk.org
Mon Jun 17 19:25:13 UTC 2024
On Mon, 17 Jun 2024 18:51:33 GMT, Volodymyr Paprotski <duke at openjdk.org> wrote:
>> What causes regression in P256 "(~-8-14%)"?
>> From what I see, you re-arranged code to not execute some code ("reducePositive()") when it is not needed. How this affects P256?
>
>> What causes regression in P256 "(~-8-14%)"? From what I see, you re-arranged code to not execute some code ("reducePositive()") when it is not needed. How this affects P256?
>
> Actually, the other way around; reducePositive is now an unconditionally executed for both pure java and the intrinsic paths. Perhaps that's what is misleading, it was only the mult() intrinsic that was taking advantage of this 'skip reduction' before. (pure java did not benefit from removing reduction, so I kept it. Now 'keeping it' for both paths)
Hi @vpaprotsk,
@ferakocz is going to take a look at the change. When he says it's ok, I'll approve the PR.
-------------
PR Comment: https://git.openjdk.org/jdk/pull/19728#issuecomment-2174249460
More information about the security-dev
mailing list